0% found this document useful (0 votes)
38 views18 pages

Devnet

The document consists of a series of technical questions related to networking, programming, and automation, covering topics such as DNS queries, MAC address construction, NAT configuration, TCP/IP layers, SQL injection, RESTful APIs, and various programming languages and tools. Each question presents multiple-choice answers or requires matching terms and descriptions, indicating a focus on assessing knowledge in IT and software development. The content is structured as a quiz or exam format for evaluating understanding of these concepts.

Uploaded by

sh8040039
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views18 pages

Devnet

The document consists of a series of technical questions related to networking, programming, and automation, covering topics such as DNS queries, MAC address construction, NAT configuration, TCP/IP layers, SQL injection, RESTful APIs, and various programming languages and tools. Each question presents multiple-choice answers or requires matching terms and descriptions, indicating a focus on assessing knowledge in IT and software development. The content is structured as a quiz or exam format for evaluating understanding of these concepts.

Uploaded by

sh8040039
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

1. Refer to the exhibit.

PC1 needs to resolve the host name of the web


server into an IP address by using DNS. What destination IP
address and destination port number will PC1 assign to the DNS
query packet?

a) 192.168.20.2 port 53
b) 192.168.20.2 port 80
c) 192.168.10.1 port 53
d) 192.168.20.3 port 80
e) 192.168.20.3 port 53

2. How is an Ethernet MAC address constructed ?

a) The first 3 bytes represent the network upon which the host
resides, and the last 3 bytes uniquely identify the host.
b) The first 3 bytes represent the vendor OUI, and the last 3 bytes
are assigned randomly by the operating system.
c) The first 3 bytes represent the vendor OUI, and the last 3 bytes
are assigned uniquely by the vendor.
d) The first 3 bytes are uniquely assigned by IANA, and the last 3
bytes represent the serial number of the host.

3. Refer to the exhibit. Router R2 is configured with static NAT.


Place in order the steps that accur when the client accesses the web
server through the router.

4. Refer to the exhibit. If PC1 is communicating with a web server on


the interent, which two TCP/IP layers are responsible for
encapsulating the message that requests data from that particular
server and assigning a source port number? (choose two)

a) Network
b) Physical
c) Application
d) Session
e) Transport

5. Data is being sent from a source PC to a destination server. which


three statements correctly describe the function of TCP or UDP in
this situation? (choose three)
a) The UDP destination port number identifies the application or
service on the server which will handle the data
b) UDP segments are encapsulated within IP packets for transport
across the network.
c) The TCP source port number identifies the sending host on the
network.
d) TCP is the preferred protocol when a function requires lower
network overhead.
e) The TCP process running on the PC randomly selects the
destination port when establishing a session with the server.
f) The source port field identifies the running application or
service that will handle data returing to the PC

6. Which two statements are true about NTP servers in an enterprise


network ? (choose two)
a) NTP servers ensure an accurate time stamp on logging and
debugging information
b) NTP servers control the mean time between failures(MTBF) for
key network devices
c) There can only be one NTP server on an enterprise network
d) All NTP server synchronize directly to a stratum 1 time source
e) NTP servers at stratum 1 are directly connected to an
authoritative time source

7. What type of attack targets an SQL database using the input field
of a user?
a) Xmp injection
b) SQL injection
c) Buffer overflow
d) Cross-site scripting

8. What is an architectural constraint to which a ture RESTful API


web service must adhere?
a) It allowes resource caching
b) It should be behind a firewall
c) It operates as a cloud service
d) It must support XMP RPC and JSON RPC

9. Which two HTTP funcitons correspond two the UPDATE function


in CRUD ? (choose two)
a) POST
b) DELETE
c) PATCH
d) PUT
e) GET
10. Math the term to the RESTAPI request
http://example.com/update/person?id=42&email=person%40exam
ple.com

11. Which HTTP status code category is used in the response to


indicate that a REST API request contains an error on the client
side?

a) 2xx
b) 1xx
c) 5xx
d) 4xx
e) 3xx

12. Match the SDLC phase with its description


a) Implmentation
b) Deployment
c) Requirements & analysis

13. In which SDLC phase is the software product installed into


the production environment to decide if it is ready for release?
a) Design
b) Deployment
c) Testing
d) Implementation

14. Which stakeholder determines the useful valu of software


product features In the lean process?
a) The reviewer
b) The programmer
c) The customer
d) The Scrum master

15. How do APIs affect traditional IT tasks?


a) They are used to eliminate repetitive manual tasks and replace
them with automation
b) They are used to increase hardware speed and lower power
consumption
c) They are used to increase computer processing speed and lower
power consumption
d) They are userd to replace network infrastructure and implement
network virtualization

16. Which string of characters is used to identify the beginning


of a new separate document when multiple documents are in a
single YAML file?
a) Three dots “…”
b) There dashes “---“
c) There slashes “///”
d) There pound signs “###”

17. Which DevNet resource would a developer user to look for a


python library that supports APIs for a specific cisco product ?
a) DevNet Sandbox
b) Code exchange
c) Devnet learning Labs
d) Devnet support
18. Which Devnet resource would a developer use in order to test
custom code in a production like environment
a) Code exchange
b) Devnet support
c) Devnet Learning labs
d) Devnet sandbox

19. What character is used to separate the key and value pairs in
YAML?
a) Forward slash /
b) Semi colon ;
c) Underscore _
d) Colon :

20. Which git command is used to compare changes between


files?
a) Git checkout
b) Git merge
c) Git diff
d) Git status

21. Which library is the most commonly used python library for
connecting NETCONF clients with a NETCONF server ?
a) Posix
b) Pypi
c) Ncclient
d) Pyclient

22. What are two characteristics of the staging environment of


the four tier deployment environment structure (choose tow )
a) It is structured as close as possible to the actual production
environment
b) It is the point where code has been tested multiple times and is
error free
c) It is where the code undergoes final acceptance testing in a
realistic environment
d) It is where end users will interact with the code
e) It often includes automated testing tools such as Jenkins,
circlecl, or travis Cl

23. Which SQL injection defense method should be used only as


a last resort?
a) Using parameterized queries
b) Using a database firewall
c) Implementing whitelist input validation
d) Escaping all user supplied input

24. What is an example of a use supported by cisco UCS


Director and UCS manager?
a) Underlying central system workflow management and
migration
b) Bare metal server provisioning and monitoring of virtual
environments
c) Call venter and call management over IP networks
d) Telemetry data collection and analysis

25. Which programming language is supported by the webex


xAPI to develop macros for on device customization
a) Python
b) Java
c) Javascript
d) C++

26. What is a function provided by an implementation of a read


only automation solution
a) The ability to use an automated request to audit configurations
and manually deploy changes in order to implement compliance
b) The ability to implement network infrastructure that receives a
configuration from a specific centralization server
c) The ability to use GET and SET requests to retrieve and send
data across the network infrastructure
d) The ability to reduce risk by implementing security policies
across the network infrastructure via automated changes

27. What is an example of a read only automation solution ?


a) Gathering SD-WAN inventory data using python and recording
the values in a database
b) Gathering the current list of ACL entries on an IOS XE router
and enforcing consistency
c) Streamlining the management of L3 firewall rules in cisco
meraki network
d) Simplifying the automation of network device authentication,
configuration , and consistency

28. What does self service refer to in the context of enterprise


IT?
a) Automated tools and methods that deliver preconfigured
developer platforms on demand
b) Distributing and Implementing broad access to public cloud
infrastructure as a service services
c) Imaging frequently used server configurations for rapid
deployment
d) Mainstreamed processes that promote a lower IT headcount by
implementing automation

29. A component was created with the intent of combining the


disciplines and skills of dev and ops . this component created a
new job role and implemented a best practices playbook for doing
ops with software methods . which component matches this
description
a) Shared version control
b) Agile infrastructure and operations
c) Automated infrastructure
d) The SRE approach

30. Which statement describe the term orchestration in IT


automation ?
a) Orchestration is the obtaining and provisioning of computer,
storage, and network infrastructure
b) Orchestration is the process of prearing a server through the
installation of libraries or daemons
c) Orchestration is aimed at managing workload lifecycles and
reacting dynamically to changing conditions in order to
optimize processes
d) Orchestration is the building, arraging, integration , and
preparation of multi component application across multiple
nodes

31. What are two characteristics of stateless applications (choose


two )
a) They can be scaled only by redeploying them and destroying the
data that users or operators previously
b) They can be freely scaled across available capacity without
disrupting ongoing customer connections
c) They can store a user state in an accessible database separate
from application servers and other components
d) They must run on container orchestrators like kubernets
e) They maintain the user state within the local user machine so
that automation can work non destructively

32. Which component in the pyATS ecology handles bunding


and running jobs ?
a) Clover
b) Easypy
c) AEtest
d) Genie

33. Which three statements describe characteristic of a virtual


machine ? (choose three)
a) It includes a guest operating system
b) It shares the operating system of the host computer
c) It requies windows as the host operating system
d) It is created and deployed using the docker format
e) It runs on top of a hypervisor
f) It is completely self contained with its own emulated storage,
memory and network interfaces

34. A student who is interested in network programmability


approaches an instructor for advice on learning more about the
subject. The student is a kinesthetic learner who learns by doing.
Which Devnet resource should the instructor consider telling the
student about
a) Devnet zone
b) Devnet Express
c) Devnet Create
d) Devnet learning labs

35. A developer issues a linux command python3 –m venv


devenv . what is the developer trying to achieve?
a) To install the devnet tool sets in the python 3 virtual
environment named venv
b) To enter the python 3 virtual environment named venu using the
devnet tool sets
c) To create a python 3 vitual environment named devenv
d) To activate the python 3 virtual environment named devenv

36. Which convention is used in python to indicate that methods


and variables in a class are private and not to be used outside of the
class
a) By declaring a private method or variable in the beginning of
the calss definition
b) By using two preceding hyphens (-) for a method or variable
c) By using the command class private classname(): to start the
class definition
d) By using a single preceding underscore (_) for a method or
variable

37. Which docker component defines the steps needed to create


an image that can be deployed in a variety of environments?
a) cross site seript
b) dockerfile
c) unionfs
d) namespaces

38. which communication protocol does ansible use to connect to


remote devices ?
a) secure FTP
b) HTTPS
c) telnet over VPN
d) SSH

39. Refer to the exhibit. A user is working on ansible on the local


NMS to manage remote network devices which file is the user
creating
a) Variable
b) Playbook
c) Service
d) Hosts

40. How can a webex teams administrator retrieve additional


details about a user through an API call ?
a) By using the value of a webex teams registered email address in
the API call
b) By using the value of the person id key in the API call
c) By using the value of orgld in the API call
d) By using the value of the organization name in the API call

41. Which type of request is used to send a message to a webex


teams space using python and the messages API?
a) Post
b) Put
c) Get
d) Patch

42. A network engineer is crating a docker container using the


docker build command. If the engineer does not specify a tag
which tag will be used by default?
a) Tag
b) (a blank space)
c) Default
d) Latest

43. Refer to the exhibit. A network engineer has created a


Jenkins pipeline. Which menu option would the engineer use to
run the pipeline?
a) Build now
b) Configure
c) Change
d) Workspace

44. In which situation would a company implement a reverse


proxy as a security solution?
a) When a hash is created based on the IP address of the request to
a particular protected server
b) When the company wants all responses to clients to look like
they came from the same server instead of individual ones
c) When the company has a database and needs to point to a DNS
server that uses different IP address for development resources
d) When responses from servers need to be sent over different
paths to ensure quality response time to the client devices
making the requests

45. A student is learning network automation by using a REST


API the student sends a request to a network device and revices a
response with the status code of 202 what does this status code
means
a) The request was understood but has been rejected by the server
b) The request has been accepted for processing but the processing
has not been completed
c) The request was successful and typically includes a payload
d) Because of a server error the request cannot be fulfilled

46. A network engineer is configuring a Jenkins job and finishing


with the following script in order to trigger the bulid
What is the purpose of the preparation stage?
a) It places a log of any errors in the SUCCESS file
b) It makes sure that any previous instances of the particular
docker container are stopped and removed
c) It runs the SUCCESS docker container
d) It catches and remove any errors

47. What platforms are provided by Devnet for community


members to share solutions, tool kits and others resources with
each other
a) Exchanges
b) Communities
c) Forums
d) Sandboxes
48. Match the devnet exchange type with the decription
a) Automation exchange
b) Code

49. Which three avenues are available within Devnet for


developers who need help with specific developer scenario
questions concerning cisco products (choose three)
a) Loggong a ticket
b) Posting to a webex teams space
c) Posting to a news group
d) Posting to the Devnet zone
e) Posting on the cisco learning network
f) Posting to a community forum

50. What are tow requirements for an application to


communicate with a webhook provider ? (choose two)
a) The host where the application is running must have an SSH
server running
b) The application must support JSON
c) The host where the application is running must have an SSH
client installed
d) The application must register a URP with the webhook provider
e) The application must always be running

51. Refer to the exhibit match the python coding information in


the authentication request to the cisoc DNA center to the location
in the script
a) 1001001027331
52. A student is learning REST API application . the student
constructs an URI to query the mapquest API for a route from new
york ,NY to Boston, MA what is the valid URI format?

53. Refer to the exhibit match the missing components of the


python script for the APIC EM REST API request for the user
‘secureuser”

54. Refer to the exhibit math the missing components to the


python script for authenticating to the cisco DNA center and
obtaining a token using the username of “secureuser” and
password of “C1$c0”

55. Refer to the exhibit. Match the missing components to the


meraki API script to complete the following tasks
. retrieve the organizations
. retrieve the netowrks and other corresponding id
. retrieve the devices and corresponding device id

56. 57. A packet is received by a server. The packet has a


destination port number of 830 that protocol or service is
requested?
a) NETCONF
b) HTTPS
c) HTTP
d) DHCP

57. 58. A software development company specializes in being


able to sue whatever software development method their customer
wants to use the lean method. What is a characteristic of this
method
a) A software development process that can only go forward
b) A process that eliminates inefficient ways of working like
expecting coders to multitask
c) A software development process that has the results of one
phase feed into the next phase
d) A software development process that focuses on frequent
delivery of working software as well as collaboration between
developers and business employees

58. 59. When thinking about the functional planes of a network


that is nnique about the management plance
a) It forwards data based on STP settings
b) It includes protocols used to monitor network devices
c) It is responsible for the switching for packet in hardware
d) It includes applicakton and protocols used between network
devices such as routers

59. 60. Which two data formats can RESTCONF use when
requesting data or responding with data (choose two)
a) HTML
b) YAML
c) YANG
d) JSON
e) XML

You might also like